Hashing OAuth2 Access Tokens¶
MWARE ESB allows enabling OAuth2 token hashing to protect OAuth2 keys (OAuth2 access tokens, refresh tokens, consumer secrets, and authorization codes) in the event of database security breach. Once the token hashing is enabled, all the OAuth2 keys will be hashed and stored in the database.
Follow the instructions below to set up OAuth token hashing.
-
Stop the ESB server if it is already running.
-
Open the
<API-M_HOME>/repository/conf/deployment.toml
file, uncomment the following configuration and set theenable_token_hashing
value to betrue
.[apim.oauth_config] enable_token_hashing = true
-
Remove the
CONN_APP_KEY
constraint from theIDN_OAUTH2_ACCESS_TOKEN
table by running the following command against the database.By default, there can only be one active access token for any consumer key, user, and scope combination. The
CON_APP_KEY
constraint in theIDN_OAUTH2_ACCESS_TOKEN
table enforces this restriction.However, when token hashing is enabled, a new access token is issued for every access token request resulting in multiple active access tokens or any consumer key, user, and scope combination. If you need to allow multiple active access tokens to exist, then you need to remove the
CONN_APP_KEY
constraint from theIDN_OAUTH2_ACCESS_TOKEN
table.Example:
If you are using an H2 database, you need to run the following command:
ALTER TABLE IDN_OAUTH2_ACCESS_TOKEN DROP CONSTRAINT IF EXISTS CON_APP_KEY
-
Follow the Generate Application Keys guide to create a new application, generate application consumer keys, and to obtain an access token.